sendmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="06c9", 0x2}], 0x1}, 0x40011) recvmmsg(r1, &(0x7f0000003040)=[{{0x0, 0x0, 0x0, 0x1000000}}], 0x1, 0x2, 0x0) BUG: memory leak unreferenced object 0xffff88800a634e00 (size 128): comm "syz-executor.1", pid 13736, jiffies 4295413024 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc eb8fca79): __kmalloc_cache_noprof+0x4a4/0x730 v9fs_init_fs_context+0x49/0x5b0 alloc_fs_context+0x56d/0xb10 path_mount+0xce2/0x2150 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: memory leak unreferenced object 0xffff88801d29ca80 (size 8): comm "syz-executor.1", pid 13736, jiffies 4295413024 hex dump (first 8 bytes): 6e 6f 62 6f 64 79 00 ff nobody.. backtrace (crc 24a71c4e): __kmalloc_node_track_caller_noprof+0x4c1/0x840 kstrdup+0x3e/0xc0 v9fs_init_fs_context+0xf3/0x5b0 alloc_fs_context+0x56d/0xb10 path_mount+0xce2/0x2150 __x64_sys_mount+0x293/0x310 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed